Priority Based Polling and Scheduling Algorithm for Intrapiconets in Bluetooth
|
|
- Lee Paul
- 5 years ago
- Views:
Transcription
1 Priority Based Polling and Scheduling Algorithm for Intrapiconets in Bluetooth R.Radhakrishnan and A.Lakshmi Department of Electronics & Communication Engineering, Kalasalingam University, Krishnankoil, Virudhunagar District, Tamil Nadu, India. Abstract - The trend of dynamically interconnecting the personal devices that people carry with them has led to the introduction of personal area networks (PANs) and personal networks (PNs). The Bluetooth wireless access technology is believed to be a potential enabler of PANs and PNs. This dissertation focuses on Bluetooth intrapiconet scheduling (also referred to as Bluetooth polling) that helps in making the Bluetooth technology a successful enabler of PANs and PNs. In order for the Bluetooth technology to be such a successful enabler, its polling mechanism should be efficient. At the same time, the polling mechanism should also be fair. Finally, the polling mechanism must be able to provide quality of service (QoS). Conventional polling mechanisms are less suitable for Bluetooth as they do not take the Bluetooth specification into account. Current Bluetooth polling mechanisms are either not able to poll in a fair and efficient manner, or they do not provide the needed QoS. The main goal of this thesis is the design of new Bluetooth polling mechanisms. To design a polling mechanism that, in case of best effort traffic, divides bandwidth among the slaves in a fair and efficient manner. To design a polling mechanism that is able to provide quality of service. These polling mechanisms help in making the Bluetooth technology a successful enabler of personal area networks, and thus of personal networks. In this research focuses on Bluetooth intra-piconet Scheduling and Reduce the time delay. It provide a better opportunity to communicate in a PAN. In this research we use Adaptive Probability-based Polling Interval (APPI) in sniff based polling mechanisms Keywords Intrapiconet pollting,scheduling, sniff mode I. Introduction Bluetooth is a radio technology targeting short- range, low-power, and low-cost wireless communications. According to the specification, a Bluetooth wireless personal area network is composed of piconets. A Bluetooth piconet is a cluster-based network unit and consists of up to eight Bluetooth devices. Among the eight devices, one is designated as the master, whereas the others serve as slaves.with a common device of two piconets, communications between individual piconets is feasible, and then, a larger scale network framework named scatternet is formed by multiple interconnected piconets. Such a relay device is usually called a gateway or a bridge. In a piconet, devices share the radio channel (physical channel) in a time-division manner, and data exchanges are controlled by the master. The data delivery from the master to a slave is categorized as downlink transmission,whereas that along the inverse direction is called uplink transmission.both directional data exchanges always alternate in a time-division duplex scheme. Slot allocation is dynamic and is managed by the master node. As to the types of connections, Bluetooth supports both synchronous and asynchronous connections. Synchronous connections satisfy the nature of circuitoriented services, whereas asynchronous connections are designed for packet-oriented services. A slave is only allowed to send packets immediately after receiving a packet explicitly addressed to it from the master. If the slave has no data to deliver, it returns a NULL packet without user information to the master. Similarly, if the master has no packets to some slave on polling it, the master can send a POLL packet without user information to the slave. Certainly, both of these special types of packets waste bandwidth and deteriorate delay performance. As transmissions from slaves are triggered by polling actions from the master, it is necessary to equip a master with the functionality of a scheduler regarding which slave should be polled and when a polling action should be initiated. Such an activity is usually called intrapiconet (polling and) scheduling. The fewer POLL/NULL packets generated, the better the performance that an intrapiconet scheduling can achieve. The problem of how to design an efficient intrapiconet scheduling algorithm is analogous to the traditional optimization problem of polling schemes [5], except that the former one involves more constraints. For example, a master device has no knowledge of the status of uplink queues, which are located in individual slaves. Therefore, it is not feasible to apply solutions of the latter with no modification to the former. This paper targets the design of an efficient Bluetooth polling and scheduling scheme that is adaptive to the current traffic pattern. In Section II, the polling-optimization problem is described, and we introduce several existing polling and scheduling schemes. The details of our proposed scheme will be explained in Section III. In Section IV, we demonstrate the superiority of our proposed scheme in various scenarios via simulations developed by NS-2 (an NS-2 extension module for Bluetooth). Finally, we conclude this paper in Section V. II. Related Work The medium access control (MAC) operations of Bluetooth could be viewed as behaviors of a single-server polling and scheduling system. The polling scheme is the set of rules that determine whether the server should switch to the AJCST Vol.1 No.1 January - June
2 Priority Based Polling and Scheduling Algorithm for Intrapiconets in Bluetooth next queue and the number of customers to be served in an individual visit. More specifically speaking, what concerns us about polling and scheduling schemes in Bluetooth MAC operations is how to efficiently use the radio resource. In fact, polling and scheduling schemes have extensively been studied and have been applied to solve many problems in the field of communication networks. It is proven that the exhaustive round-robin (ERR) polling policy is the optimal polling and scheduling scheme for symmetric systems, in which the distribution of offered traffic is uniform to all queues. In addition, as long as all queue lengths are given in advance, the optimal service order is obtained by following the longest first policy. However, in case not all queues status are available, the cyclic scheduling scheme would be the best choice. Comparing the system model of these discussions with Bluetooth MAC operations, there are two major differences: The first is that the visits of the server to the master-to-slave and slave-to-master queues are strictly relevant in Bluetooth as every transmission on an uplink must be triggered by a poll packet on the associated downlink. Moreover, the other distinction is the piconet master s partial knowledge of the queues status. According to the Bluetooth specification, a master device would never acquire up-to-date status of slave- to-master queues whenever it is necessary. In the past few years, several algorithms have been proposed to solve the scheduling problem of Bluetooth, and some solutions impractically assumed that a master always knows the latest status (e.g., queue length, traffic load, etc.) of all uplink queues at any time. For brevity, such algorithms are categorized as ideal solutions in our work. RR is a general polling and scheduling policy. It determines a fixed polling order, and the master addresses each slave once in that order. Just like RR, ERR serves all slave nodes according to a fixed polling order. The most evident difference between them is that ERR would continuously serve a slave until there are no data that need to be exchanged between master and slave. In fact, ERR visits each queue exactly once per cycle; hence, the cycle length can vary according to the traffic characteristics without bound. The main disadvantage of ERR is that the resource can be occupied by nodes generating traffic higher than the system capacity. The simplest way to design a fairer algorithm is to limit the number of transmissions (tokens) that can be performed by each pair per cycle. Another member of the RR family is limited RR (LRR). LRR is similar to ERR, except that the former uses a parameter t to limit the number of transmissions performed by each pair per cycle. Intuitively, the cycle length can be determined by the maximum number of transmissions and the number of pairs. Capone et al. [2] concluded that ERR demonstrates the best throughput performance, compared with RR and LRR, whereas LRR outperforms the other two policies in delay performance. Adaptive traffic polling and scheduling (ATPS) is used no statistical data are ready for referencing. Accordingly, a default procedure is predetermined for initialization This procedure sets a default sequence of slaves and identicalservice time to each slave for the first cycle. After the preliminary period, the core of ATPS, i.e., the PSD and STE algorithms, would be triggered each time a new cycle starts. During a cycle, what ATPS has to do is to identify which slave should be served at present and then to perform corresponding slave serving. For better readability, we integrate these operations to an algorithm named polling. ATPS composed of several algorithms. Here we are using only two algorithms of it, a) Polling sequence determination (PSD) b) Sequence time estimation (STE) PSD is used to dynamically determine the polling sequence in the beginning of each cycle. As previously mentioned, queue status is a significant factor of intrapiconet scheduling. The most intuitive status is usually the queue length. Its definition can more widely be extended. In PSD, the so-called queue status includes the maximum queue length and the link utilization. PSD determines the polling sequence based on the slaves weights. The STE algorithm deals with the mission of service- time allocation in a cycle. The information that STE relies on includes the queue status and queuing delay. As indicated in the STE algorithm, we estimate service time according to the queuing delay of the first packet. III. Proposed Scheme Proposed system supports both synchronous and asynchronous connection oriented link. this system use Sniff- Based Polling and Scheduling algorithm(sbps).incase of best effort traffic, the design of new bluetooth polling mechanism divided bandwidth among the slaves in a fair and efficient manner.to design a polling mechanism that is able to improve quality of service. These polling mechanisms help in making the Bluetooth technology a successful enabler of personal area networks, and thus of personal networks. The polling mechanism must be suitable for providing quality of service (QoS). For instance, if a personal area network includes a Bluetooth-enabled computer, Bluetooth speakers, and a Bluetooth Internet access point, the audio you are listening to should not be disturbed by an Internet download session that you initiate. The QoS to be provided by the polling mechanism should be minimally influenced by nonideal radio environments. For instance, if a personal area network includes a Bluetooth-enabled mobile phone and a Bluetooth headset, a phone conversation should be performed as good as possible in the presence of interference. A. SBPS Algorithm One of the operation modes of a Bluetooth node described in 17 AJCST Vol.1 No.1 January - June 2012
3 R.Radhakrishnan and A.Lakshmi the Bluetooth specification is the sniff mode. The sniff mode is used to reduce a slave s listen duty cycle. Consequently, if a slave is in sniff mode then the master can only start transmission to that slave in specified time slots. Considering the fact that polling an inactive slave is a waste of power and bandwidth and considering the fact that switching a slave to sniff mode and back also costs power and bandwidth the main idea behind this mechanisms is to switch a slave to sniff mode whenever switching a slave to sniff mode and back costs less power and bandwidth than staying in active mode (normal operation mode). mechanism. The system may determine the priority based on memory requirements, time limits, or other resource usage. Starvation occurs if a low priority process never runs. Solution: build aging into a variable priority. Delicate balance between giving favorable response for interactive jobs, but not starving batch jobs. Each process is placed in a runqueue Allocated a service quantum of time (commonly set to 10 milliseconds) Processes that demand less time run without being interrupted Processes exceeding the service quantum are interrupted and returned to the back of the runqueue to await further processing. B. Modules Descriptions Bluetooth is a wireless access technology that operates in the 2.4 GHz ISM (Industrial Scientific Medical) band. Bluetooth nodes are either a master or a slave, and communication only takes place between a master and a slave, and never directly between two slaves or two masters. One master and up to seven slaves can be affiliated with each other and form a so-called piconet. Calculate the number of nodes present in the piconet then allocate the time of completion process in transaction the data. One of the operation modes of a Bluetooth node described in the Bluetooth specification is the sniff mode. The sniff mode is used to reduce a slave s listen duty cycle. Consequently, if a slave is in sniff mode then the master can only start transmission to that slave in specified time slots. Considering the fact that polling an inactive slave is a waste of power and bandwidth and considering the fact that switching a slave to sniff mode and back also costs power and bandwidth the main idea behind this mechanisms is to switch a slave to sniff mode whenever switching a slave to sniff mode and back costs less power and bandwidth than staying in active mode (normal operation mode). We use weighted priority scheduling algorithm, This algorithm first allow the weighted node means that node has high amount of data. C. Performance Evolution We compare SBPS with ATPS, PSD, STE on the throughput, delay, and fairness performance. Among several existing Bluetooth modules of ns-2, we used UCBT, which is a robust, flexible, and up-to-date one. In the following sections, we first describe assumptions and relevant parameter settings used in our simulation. Basically, we consider three scenarios here. Finally, we discuss the behavior of SBPS and how much gain it can achieve. IV. Simulation Results Fig. 1 Flow chart of proposed method Assign each process a priority. Schedule the highest priority first. All processes within same priority are FCFS. Priority may be determined by user or by some default In our simulation, ACL connection is the only connection type that we considered. We assume that there is no limitation in queue size for all devices. As to traffic generation, we use the exponential ON/OFF traffic model to establish all data AJCST Vol.1 No.1 January - June
4 flows. The exponential ON/OFF traffic model generates data flows according to the given packet size, ON time, OFF time, and data rate. The start time of a flow is randomly determined. we proposed a new intrapiconet scheduling algorithm called SBPS. SBPS takes the queue status and queuing delay into account. More specifically, the queue status includes the maximum queue length and link utilization. Compared with other competitors, Priority Based Polling and Scheduling Algorithm for Intrapiconets in Bluetooth Fig. 4 End-to-End delay Analysis Fig. 2 Node discovery (broadcast) Fig.5 Packet loss Analysis V. Conclusion Fig. 3 Throughput Analysis Bluetooth uses a polling mechanism, which is applied by the master, to divide the bandwidth among the remaining participants (the slaves) in a piconet. This polling mechanism, also referred to as the Bluetooth intra-piconet scheduling mechanism, highly determines the performance of the traffic flows in a Bluetooth piconet In order for the Bluetooth technology to be a successful enabler of personal area networks, the Bluetooth polling mechanism should be efficient in order to get the most out of the scarce bandwidth. At the same time, the polling mechanism should be fair, i.e., it should not ignore lowly loaded slaves. Finally, the polling mechanism must be able to provide quality of service, with the development of the polling mechanisms and techniques presented in this dissertation, the main goal of this work has been met. First, we developed a polling mechanism that is able to divide bandwidth among the slaves 19 AJCST Vol.1 No.1 January - June 2012
5 R.Radhakrishnan and A.Lakshmi in a piconet in a fair and efficient manner (best effort case). Second, we developed polling mechanisms that are able to provide QoS. These polling mechanisms help in making the Bluetooth technology a successful enabler of personal area networks, and thus of personal networks. VI. Future Work This work focused on scheduling, which is crucial for making the Bluetooth technology a successful enabler of personal area networks. However, there are other crucial PAN- related research issues [NHdG03] such as power consumption, security, context discovery, and cooperation with fixed infrastructures. The success of the Bluetooth technology as an enabler for personal area networks also requires research to be coned on these issues. References [1] Ching-Fang Hsu, and Chien-Yu Liu, An adaptive Traffic-Aware Polling and scheduling Algorithm for Bluetooth Piconet, IEEE VTC 2010 vol.59,no3. [2] A.Capone, M.Gerla, and R.Kapoor, Efficient polling schemes for Bluetooth picoells, IEEE Icc vol.7.pp [3] B.S.Lee, H.W.Kim,T.U.Yang,Y.S.Park,B.H.Ahn, and J.C.Ahn, A new efficient scheduling algorithm in bluetooth piconet, IEEE GLOBECOM, 2004,vol.6, PP [4] Y.Z.Lee,R.Kapoor, and M.gerla, An efficient and fair polling scheme for bluetooth, IEEE MILCOM, 2002, VOL.2, PP [5] V.B.Misic, E.W.S.Ko, and J.Misc, Adaptive cycle limited scheduling scheme for bluetooth piconets, IEEE PIMRC, 2003, vol.2, pp [6] Y.S. Chang, S.c. Park, and S.Y.Lee, An enhanced through put and Qos- aware scheduling policy for Bluetooth, IEEE WCNC, 2004, Vol.2.pp, [7] V.B.Misic,E.W.S.ko and J.Misic, Load and QoS-adaptive scheduling in bluetooth piconets, IEEE HICSS, 2004, pp [8] K.L. Chan, V.B. Misic, and J.Misic, Efficent polling sehemes for Bluetooth picocells revisited, 37th hawaii int. Conf. Syst. Sci., Jan. 2004, pp [9] J.Misic and V.B.Misic, Modeling Bluetooth piconet performance, IEEE Communication Lett., vol.7, no.18-20, Jan [10] M.Kalia, D.Bansal, and R.Shoreey, Data Scheduling and SAR for Bluetooth MAC, IEEE VTC, 2000, vol.2, pp [11] Joao henriquekleinschmidt, marcelo E. pellenz and Luiz A.De Paula Lima Jr, An Efficient Polling Strategy for Bluetooth piconets using channel state information, IEEE 6th CAS symp. On Emerging technologies : Mobile and wireless comm. [12] Asmaa Ibrahim, rawyarizk, and gamalmahmoud, A Priority gated Round Robin polling scheme for Bluetooth piconets, the international Arab journal of information technology, vol.5, no.2, April [13] Ivan Howitt, Mutual Interference between Independent Bluetooth piconets, IEEE Transactions on vehicular technology, vol.52, no.3, May [14]. Andrea zanella, danielemiorandi, Silvanopupolin, cristianandreola, A soft Qos scheduling Algorithm for bluetoothpiconets. AJCST Vol.1 No.1 January - June
Class-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More informationPolling in Bluetooth a Simplified Best Effort Case
Polling in Bluetooth a Simplified Best Effort Case Rachid Ait Yaiz University of Twente (Computer Science, TSS Group) Geert Heijenk University of Twente and Ericsson EuroLab Netherlands {yaiz,heijenk}@cs.utwente.nl
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationLink Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet
Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet Sabeen Tahir, Abas Md Said, and Sheikh Tahir Bakhsh Abstract A mobile ad-hoc network (MANET) is a collection of wireless
More informationOn the Analysis of the Bluetooth Time Division Duplex Mechanism
On the Analysis of the Bluetooth Time Division Duplex Mechanism Gil Zussman, Adrian Segall* and Uri Yechiali Abstract Efficient communication in Bluetooth networks requires design of intra and inter-piconet
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationTO APPEAR IN IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, On the Analysis of the Bluetooth Time Division Duplex Mechanism
TO APPEAR IN IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007 1 On the Analysis of the Bluetooth Time Division Duplex Mechanism Gil Zussman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationAn Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks
An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks Raymond Y.L. Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,Vancouver, BC,
More informationInterference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationBluetooth Time Division Duplex - Exact Analysis as a Polling System
CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of
More informationAn Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks
Title An Integrated Approach to Scatternet Traffic Management in Bluetooth Ad Hoc Networks Author(s) Shek, LLY; Kwok, YK Citation Proceedings - Ieee Computer Society's International Computer Software And
More informationIntra-Piconet Polling Algorithms in Bluetooth
Intra-Piconet Polling Algorithms in Bluetooth Jelena Mišić and Vojislav B. Mišić Bluetooth is an emerging standard for Wireless Personal Area Networks (WPANs): short range, ad hoc wireless networks [1].
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationA Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices
A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli
More informationCommunication Systems. WPAN: Bluetooth. Page 1
Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationA simple adaptive MAC scheduling scheme for bluetooth scatternet
Title A simple adaptive AC scheduling scheme for bluetooth scatternet Author(s) Liu, C; Yeung, KL Citation Ieee Vehicular Technology Conference,, v. 58 n. 4, p. 65-69 Issued Date URL http://hdl.handle.net/7/4645
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationImproving the performance of Bluetooth piconets with synchronous and asynchronous traffic
Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic Vojislav B. Mišić, Jelena Mišić, and Ka Lok Chan Abstract The Bluetooth specification allows both asynchronous
More informationMOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More informationInside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface
Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationASP: An Adaptive Energy-Efficient Polling Algorithm for Bluetooth Piconets
: An Adaptive Energy-Efficient Polling Algorithm for Bluetooth Piconets Mark Perillo, Wendi B. Heinzelman Department of Electrical and Computer Engineering University of Rochester Rochester, NY 4627 fperillo,
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationlntroducing Service Differentiation in a Bluetooth Piconet
lntroducing Service Differentiation in a Bluetooth Piconet Antoine Mercier1 and Pascale Minet2 1 Ecole Centrale d'electronique, LACCSC, 53 rue de Grenelle, 75007 Paris, France mercierlece.fr 2 INRIA, Rocquencourt,
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationSubject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date:
Subject Name: OPERATING SYSTEMS Subject Code: 10EC65 Prepared By: Kala H S and Remya R Department: ECE Date: Unit 7 SCHEDULING TOPICS TO BE COVERED Preliminaries Non-preemptive scheduling policies Preemptive
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationA Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks
A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationMaximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication
Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of
More informationFig. 1. Superframe structure in IEEE
Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationLast Class: Processes
Last Class: Processes A process is the unit of execution. Processes are represented as Process Control Blocks in the OS PCBs contain process state, scheduling and memory management information, etc A process
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationLecture Topics. Announcements. Today: Uniprocessor Scheduling (Stallings, chapter ) Next: Advanced Scheduling (Stallings, chapter
Lecture Topics Today: Uniprocessor Scheduling (Stallings, chapter 9.1-9.3) Next: Advanced Scheduling (Stallings, chapter 10.1-10.4) 1 Announcements Self-Study Exercise #10 Project #8 (due 11/16) Project
More informationPerformance Analysis of UGS and BE QoS classes in WiMAX
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 7 (2013), pp. 805-810 Research India Publications http://www.ripublication.com/aeee.htm Performance Analysis of UGS and
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationScheduling. The Basics
The Basics refers to a set of policies and mechanisms to control the order of work to be performed by a computer system. Of all the resources in a computer system that are scheduled before use, the CPU
More informationChapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS
Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful
More informationTPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks
: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks Chu Zhang, Vincent W.S. Wong, and Victor C.M. Leung Department of Electrical and Computer Engineering The University of British
More informationSIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas
SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many
More informationSpecial Course in Computer Science: Local Networks. Lecture
Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationProperties of Processes
CPU Scheduling Properties of Processes CPU I/O Burst Cycle Process execution consists of a cycle of CPU execution and I/O wait. CPU burst distribution: CPU Scheduler Selects from among the processes that
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationStretch-Optimal Scheduling for On-Demand Data Broadcasts
Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu
More informationA Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks
A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung
More informationSchemes: an Analytical Approach
Performance Evaluation of Bluetooth Polling Schemes: an Analytical Approach Daniele Miorandi Andrea Zanella Gianfranco Pierobon Abstract In the recent years many polling schemes for Bluetooth networks
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationDMP Packet Scheduling For Wireless Sensor Network
American Journal of Engineering Research (AJER) 2015 American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-08-15 www.ajer.org Research Paper Open
More informationVoIP over wireless networks: a packet scheduling approach to provide QoS using Linux
VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler
More informationPERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES
PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution
More informationBhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India
Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,
More informationOperating System Review Part
Operating System Review Part CMSC 602 Operating Systems Ju Wang, 2003 Fall Virginia Commonwealth University Review Outline Definition Memory Management Objective Paging Scheme Virtual Memory System and
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More information101seminartopics.com. Bluetooth Based Smart Sensor Networks
Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationOperating System Concepts Ch. 5: Scheduling
Operating System Concepts Ch. 5: Scheduling Silberschatz, Galvin & Gagne Scheduling In a multi-programmed system, multiple processes may be loaded into memory at the same time. We need a procedure, or
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More information12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"
Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency
More informationWireless Personal Area Networks
CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principles of Operating Systems Prof Yuanyuan (YY) Zhou Scheduling Announcement l Homework 2 due on October 26th l Project 1 due on October 27th 2 Scheduling Overview l In discussing process management
More informationSolving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09
Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationWireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.
Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July
More informationMaster. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3
/ Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationMPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE
MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,
More informationEmbedded Systems. 8. Communication
Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationCPU THREAD PRIORITIZATION USING A DYNAMIC QUANTUM TIME ROUND-ROBIN ALGORITHM
CPU THREAD PRIORITIZATION USING A DYNAMIC QUANTUM TIME ROUND-ROBIN ALGORITHM Maysoon A. Mohammed 1, 2, Mazlina Abdul Majid 1, Balsam A. Mustafa 1 and Rana Fareed Ghani 3 1 Faculty of Computer System &
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationUNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.
Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless
More informationALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL
BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationImproving Channel Scanning Procedures for WLAN Handoffs 1
Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely
More informationWireless Sensor Networks
Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal
More informationSections Describing Standard Software Features
30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationCS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth
CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks
More informationReview. Preview. Three Level Scheduler. Scheduler. Process behavior. Effective CPU Scheduler is essential. Process Scheduling
Review Preview Mutual Exclusion Solutions with Busy Waiting Test and Set Lock Priority Inversion problem with busy waiting Mutual Exclusion with Sleep and Wakeup The Producer-Consumer Problem Race Condition
More informationEfficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks
Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Mrs.K.Indumathi 1, Mrs. M. Santhi 2 M.E II year, Department of CSE, Sri Subramanya College Of Engineering and Technology,
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimal Round
More information